期刊文献+

An Efficient Threshold Key-Insulated Signature Scheme

An Efficient Threshold Key-Insulated Signature Scheme
原文传递
导出
摘要 To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least k out of n helpers are needed to update a user's temporary private key.On the one hand,even if up to k 1 helpers are compromised in addition to the exposure of any of temporary private keys,security of the non-exposed periods is still assured.On the other hand,even if all the n helpers are compromised,we can still ensure the security of all periods as long as none of temporary private keys is exposed.Compared with traditional key-insulated signature(KIS) schemes,the proposed TKIS scheme not only greatly enhances the security of the system,but also provides flexibility and efficiency. To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user's temporary private key. On the one hand, even if up to k-1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期658-662,共5页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (Nos.60970111,60903189 and 60903020) the National High Technology Research and Development Program (863) of China (No.2009AA01Z418) the National Basic Research Program (973) of China(No.2007CB311201)
关键词 threshold key-insulation SIGNATURE random oracle model threshold key-insulation, signature, random oracle model
  • 相关文献

参考文献7

  • 1DODIS Y, KATZ J, Xu S, et al. Key-insulated public-key cryptosystems [C]//Proceedings o.f EURO- CRYPT'02: LNCS 2332. Berlin: Springer-Verlag, 2002: 65-82.
  • 2HANAOKA G, HANAOKA Y, IMAI H. Parallel keyinsulated public key encryption [C]// Proceedings of PKC'06: LNCS 3958. Berlin: Springer-Verlag, 2006: 105-122.
  • 3WENG J, LIU S, et al. Identity-based threshold keyinsulated encryption without random oracles [C]// Proceedings of CT-RSA '08: LNCS 4964. Berlin, Germany: Springer-Verlag, 2008: 203-220.
  • 4DODIS Y, KATZ J, Xu S, et al. Strong key-insulated signature schemes [C]//Proceedings of PKC'03: LNCS 2567. Berlin, Germany: Springer-Verlag, 2003: 130- 144.
  • 5翁健,陈克非,李祥学,刘胜利,邱卫东.Parallel Key-insulated Signature: Framework and Construction[J].Journal of Shanghai Jiaotong university(Science),2008,13(1):6-11. 被引量:2
  • 6WATERS B. Efficient identity-based encryption with- out random oracles [C]// Proceedings of EURO- CRYPT'05: LNCS 3494. Berlin, Germany: Springer- Verlag, 2005: 114-127.
  • 7BONEH D, FRANKLIN M. Identity based encryption from the weil pairing [C]// Proceedings of CRYPTO'01: LNCS 2139. Berlin, Germany: Springer- Verlag, 2001: 213-229.

二级参考文献9

  • 1Anderson R.Two remarks on public-key cryptol-ogy. http://www.cl.cam.ac.uk/users/rjal4/ . 1997
  • 2Bellare M,Miner S.A forward-secure digital signature scheme[].Proceedings of CRYPTO‘.1999
  • 3Itkis G,,Reyzin L.SiBIR: signer-based intrusion-resilient signatures[].Proceedings of Crypto‘.2002
  • 4Dodis Y,,Katz J,Xu S, et al.Key-insulated public-key cryptosystems[].Proceedings of Eurocrypt‘.2002
  • 5Hanaoka G,Hanaoka Y,Imai H.Parallel key-insulated public key encryption[].Proceedings of PKC.2006
  • 6Zhang F,,Safavi-Naini R,Susilo W.An efficient signature scheme from bilinear pairings and its applica-tions[].Proceedings of PKC.2004
  • 7Dodis Y,,Katz J,Xu S, et al.Strong key-insulated signature schemes[].Proceedings of PKC.2003
  • 8Gonzalez-Deleito N,,Markowitch O,Dall‘Olio E.A new key-insulated signature scheme[].Proceedings of ICICS‘.2004
  • 9Le Z,Ouyang Y,Ford J, et al.A hierarchical key-insulated signature scheme in the CA trust model[].Proceedings of ISC‘.2004

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部